SMBServer.cs 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337
  1. /* Copyright (C) 2014-2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using System.Net;
  10. using System.Net.Sockets;
  11. using SMBLibrary.Authentication.GSSAPI;
  12. using SMBLibrary.NetBios;
  13. using SMBLibrary.Services;
  14. using SMBLibrary.SMB1;
  15. using SMBLibrary.SMB2;
  16. using Utilities;
  17. namespace SMBLibrary.Server
  18. {
  19. public partial class SMBServer
  20. {
  21. public const int NetBiosOverTCPPort = 139;
  22. public const int DirectTCPPort = 445;
  23. public const string NTLanManagerDialect = "NT LM 0.12";
  24. public const bool EnableExtendedSecurity = true;
  25. private ShareCollection m_shares; // e.g. Shared folders
  26. private GSSProvider m_securityProvider;
  27. private NamedPipeShare m_services; // Named pipes
  28. private IPAddress m_serverAddress;
  29. private SMBTransportType m_transport;
  30. private bool m_enableSMB1;
  31. private bool m_enableSMB2;
  32. private Socket m_listenerSocket;
  33. private bool m_listening;
  34. private Guid m_serverGuid;
  35. public event EventHandler<LogEntry> OnLogEntry;
  36. public SMBServer(ShareCollection shares, GSSProvider securityProvider, IPAddress serverAddress, SMBTransportType transport) : this(shares, securityProvider, serverAddress, transport, true, true)
  37. {
  38. }
  39. public SMBServer(ShareCollection shares, GSSProvider securityProvider, IPAddress serverAddress, SMBTransportType transport, bool enableSMB1, bool enableSMB2)
  40. {
  41. m_shares = shares;
  42. m_securityProvider = securityProvider;
  43. m_serverAddress = serverAddress;
  44. m_serverGuid = Guid.NewGuid();
  45. m_transport = transport;
  46. m_enableSMB1 = enableSMB1;
  47. m_enableSMB2 = enableSMB2;
  48. m_services = new NamedPipeShare(shares.ListShares());
  49. }
  50. public void Start()
  51. {
  52. if (!m_listening)
  53. {
  54. m_listening = true;
  55. m_listenerSocket = new Socket(m_serverAddress.AddressFamily, SocketType.Stream, ProtocolType.Tcp);
  56. int port = (m_transport == SMBTransportType.DirectTCPTransport ? DirectTCPPort : NetBiosOverTCPPort);
  57. m_listenerSocket.Bind(new IPEndPoint(m_serverAddress, port));
  58. m_listenerSocket.Listen((int)SocketOptionName.MaxConnections);
  59. m_listenerSocket.BeginAccept(ConnectRequestCallback, m_listenerSocket);
  60. }
  61. }
  62. public void Stop()
  63. {
  64. m_listening = false;
  65. SocketUtils.ReleaseSocket(m_listenerSocket);
  66. }
  67. // This method Accepts new connections
  68. private void ConnectRequestCallback(IAsyncResult ar)
  69. {
  70. Socket listenerSocket = (Socket)ar.AsyncState;
  71. Socket clientSocket;
  72. try
  73. {
  74. clientSocket = listenerSocket.EndAccept(ar);
  75. }
  76. catch (ObjectDisposedException)
  77. {
  78. return;
  79. }
  80. catch (SocketException ex)
  81. {
  82. const int WSAECONNRESET = 10054;
  83. // Client may have closed the connection before we start to process the connection request.
  84. // When we get this error, we have to continue to accept other requests.
  85. // See http://stackoverflow.com/questions/7704417/socket-endaccept-error-10054
  86. if (ex.ErrorCode == WSAECONNRESET)
  87. {
  88. m_listenerSocket.BeginAccept(ConnectRequestCallback, m_listenerSocket);
  89. }
  90. Log(Severity.Debug, "Connection request error {0}", ex.ErrorCode);
  91. return;
  92. }
  93. ConnectionState state = new ConnectionState(Log);
  94. // Disable the Nagle Algorithm for this tcp socket:
  95. clientSocket.NoDelay = true;
  96. state.ClientSocket = clientSocket;
  97. state.ClientEndPoint = clientSocket.RemoteEndPoint as IPEndPoint;
  98. state.LogToServer(Severity.Verbose, "New connection request");
  99. try
  100. {
  101. // Direct TCP transport packet is actually an NBT Session Message Packet,
  102. // So in either case (NetBios over TCP or Direct TCP Transport) we will receive an NBT packet.
  103. clientSocket.BeginReceive(state.ReceiveBuffer.Buffer, state.ReceiveBuffer.WriteOffset, state.ReceiveBuffer.AvailableLength, 0, ReceiveCallback, state);
  104. }
  105. catch (ObjectDisposedException)
  106. {
  107. }
  108. catch (SocketException)
  109. {
  110. }
  111. m_listenerSocket.BeginAccept(ConnectRequestCallback, m_listenerSocket);
  112. }
  113. private void ReceiveCallback(IAsyncResult result)
  114. {
  115. ConnectionState state = (ConnectionState)result.AsyncState;
  116. Socket clientSocket = state.ClientSocket;
  117. if (!m_listening)
  118. {
  119. clientSocket.Close();
  120. return;
  121. }
  122. int numberOfBytesReceived;
  123. try
  124. {
  125. numberOfBytesReceived = clientSocket.EndReceive(result);
  126. }
  127. catch (ObjectDisposedException)
  128. {
  129. return;
  130. }
  131. catch (SocketException)
  132. {
  133. return;
  134. }
  135. if (numberOfBytesReceived == 0)
  136. {
  137. // The other side has closed the connection
  138. state.LogToServer(Severity.Debug, "The other side closed the connection");
  139. clientSocket.Close();
  140. return;
  141. }
  142. NBTConnectionReceiveBuffer receiveBuffer = state.ReceiveBuffer;
  143. receiveBuffer.SetNumberOfBytesReceived(numberOfBytesReceived);
  144. ProcessConnectionBuffer(ref state);
  145. if (clientSocket.Connected)
  146. {
  147. try
  148. {
  149. clientSocket.BeginReceive(state.ReceiveBuffer.Buffer, state.ReceiveBuffer.WriteOffset, state.ReceiveBuffer.AvailableLength, 0, ReceiveCallback, state);
  150. }
  151. catch (ObjectDisposedException)
  152. {
  153. }
  154. catch (SocketException)
  155. {
  156. }
  157. }
  158. }
  159. public void ProcessConnectionBuffer(ref ConnectionState state)
  160. {
  161. Socket clientSocket = state.ClientSocket;
  162. NBTConnectionReceiveBuffer receiveBuffer = state.ReceiveBuffer;
  163. while (receiveBuffer.HasCompletePacket())
  164. {
  165. SessionPacket packet = null;
  166. try
  167. {
  168. packet = receiveBuffer.DequeuePacket();
  169. }
  170. catch (Exception)
  171. {
  172. state.ClientSocket.Close();
  173. }
  174. if (packet != null)
  175. {
  176. ProcessPacket(packet, ref state);
  177. }
  178. }
  179. }
  180. public void ProcessPacket(SessionPacket packet, ref ConnectionState state)
  181. {
  182. if (packet is SessionRequestPacket && m_transport == SMBTransportType.NetBiosOverTCP)
  183. {
  184. PositiveSessionResponsePacket response = new PositiveSessionResponsePacket();
  185. TrySendPacket(state, response);
  186. }
  187. else if (packet is SessionKeepAlivePacket && m_transport == SMBTransportType.NetBiosOverTCP)
  188. {
  189. // [RFC 1001] NetBIOS session keep alives do not require a response from the NetBIOS peer
  190. }
  191. else if (packet is SessionMessagePacket)
  192. {
  193. // Note: To be compatible with SMB2 specifications, we must accept SMB_COM_NEGOTIATE.
  194. // We will disconnect the connection if m_enableSMB1 == false and the client does not support SMB2.
  195. bool acceptSMB1 = (state.ServerDialect == SMBDialect.NotSet || state.ServerDialect == SMBDialect.NTLM012);
  196. bool acceptSMB2 = (m_enableSMB2 && (state.ServerDialect == SMBDialect.NotSet || state.ServerDialect == SMBDialect.SMB202 || state.ServerDialect == SMBDialect.SMB210));
  197. if (SMB1Header.IsValidSMB1Header(packet.Trailer))
  198. {
  199. if (!acceptSMB1)
  200. {
  201. state.LogToServer(Severity.Verbose, "Rejected SMB1 message");
  202. state.ClientSocket.Close();
  203. return;
  204. }
  205. SMB1Message message = null;
  206. try
  207. {
  208. message = SMB1Message.GetSMB1Message(packet.Trailer);
  209. }
  210. catch (Exception ex)
  211. {
  212. state.LogToServer(Severity.Warning, "Invalid SMB1 message: " + ex.Message);
  213. state.ClientSocket.Close();
  214. return;
  215. }
  216. state.LogToServer(Severity.Verbose, "SMB1 message received: {0} requests, First request: {1}, Packet length: {2}", message.Commands.Count, message.Commands[0].CommandName.ToString(), packet.Length);
  217. if (state.ServerDialect == SMBDialect.NotSet && m_enableSMB2)
  218. {
  219. // Check if the client supports SMB 2
  220. List<string> smb2Dialects = SMB2.NegotiateHelper.FindSMB2Dialects(message);
  221. if (smb2Dialects.Count > 0)
  222. {
  223. SMB2Command response = SMB2.NegotiateHelper.GetNegotiateResponse(smb2Dialects, m_securityProvider, state, m_serverGuid);
  224. if (state.ServerDialect != SMBDialect.NotSet)
  225. {
  226. state = new SMB2ConnectionState(state, AllocatePersistentFileID);
  227. }
  228. TrySendResponse(state, response);
  229. return;
  230. }
  231. }
  232. if (m_enableSMB1)
  233. {
  234. ProcessSMB1Message(message, ref state);
  235. }
  236. else
  237. {
  238. // [MS-SMB2] 3.3.5.3.2 If the string is not present in the dialect list and the server does not implement SMB,
  239. // the server MUST disconnect the connection [..] without sending a response.
  240. state.LogToServer(Severity.Verbose, "Rejected SMB1 message");
  241. state.ClientSocket.Close();
  242. }
  243. }
  244. else if (SMB2Header.IsValidSMB2Header(packet.Trailer))
  245. {
  246. if (!acceptSMB2)
  247. {
  248. state.LogToServer(Severity.Verbose, "Rejected SMB2 message");
  249. state.ClientSocket.Close();
  250. return;
  251. }
  252. List<SMB2Command> requestChain;
  253. try
  254. {
  255. requestChain = SMB2Command.ReadRequestChain(packet.Trailer, 0);
  256. }
  257. catch (Exception ex)
  258. {
  259. state.LogToServer(Severity.Warning, "Invalid SMB2 request chain: " + ex.Message);
  260. state.ClientSocket.Close();
  261. return;
  262. }
  263. state.LogToServer(Severity.Verbose, "SMB2 request chain received: {0} requests, First request: {1}, Packet length: {2}", requestChain.Count, requestChain[0].CommandName.ToString(), packet.Length);
  264. ProcessSMB2RequestChain(requestChain, ref state);
  265. }
  266. else
  267. {
  268. state.LogToServer(Severity.Warning, "Invalid SMB message");
  269. state.ClientSocket.Close();
  270. }
  271. }
  272. else
  273. {
  274. state.LogToServer(Severity.Warning, "Invalid NetBIOS packet");
  275. state.ClientSocket.Close();
  276. return;
  277. }
  278. }
  279. public static void TrySendPacket(ConnectionState state, SessionPacket response)
  280. {
  281. Socket clientSocket = state.ClientSocket;
  282. try
  283. {
  284. clientSocket.Send(response.GetBytes());
  285. }
  286. catch (SocketException)
  287. {
  288. }
  289. catch (ObjectDisposedException)
  290. {
  291. }
  292. }
  293. public void Log(Severity severity, string message)
  294. {
  295. // To be thread-safe we must capture the delegate reference first
  296. EventHandler<LogEntry> handler = OnLogEntry;
  297. if (handler != null)
  298. {
  299. handler(this, new LogEntry(DateTime.Now, severity, "SMB Server", message));
  300. }
  301. }
  302. public void Log(Severity severity, string message, params object[] args)
  303. {
  304. Log(severity, String.Format(message, args));
  305. }
  306. }
  307. }